O'Reilly logo

Metasploit Bootcamp by Nipun Jaswal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Fingerprinting the target with DB_NMAP

As we discussed in the previous chapters, creating a new workspace and using it will ensure that the current results won't merge with scan results already present in the database; hence, it is recommended to create a new workspace for all new projects. Let us quickly perform an Nmap scan over the target on some most general ports, as shown in the following screenshot:

Welcome to the places where the sun doesn't shine. You have no vulnerable services running on the target. However, the only good information we got is that the target is running a Windows operating system, which may be Windows Server 2008 ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required